<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

La importancia de la visibilidad en la red

January 30, 2018

Close-Up of technician checking cables in a rack mounted server.jpeg

English version

Cada vez más los gerentes de seguridad de TI instalan más herramientas protección y defensa para contrarrestar el creciente número de sofisticados ataques, pero estas herramientas necesitan acceso al 100% de los datos, cada byte, cada bit y cada paquete para ser más efectivos en sus labores.

A medida que se necesiten datos más precisos y en tiempo real, el gran desafío es : dónde y cómo conseguir una copia auténtica y exacta del tráfico de la red para alimentar a los dispositivos de análisis y seguridad?, es aquí donde la visibilidad de la red se hace necesaria y vital. Los TAPs ( Test Access Point ) de Garland Technology son unos dispositivos sencillos, prácticos y de bajo costo que con una simple instalación sin compleja configuración pueden satisfacer la demanda que los administradores de red de hoy.

Cuando la visibilidad es pobre, los incidentes que de alguna manera podrían ser resueltos rápidamente pueden ser más complejos, también en efecto es que los tiempos de resolución también aumentan y se vuelven más intensivos en recursos. Además, se vuelve difícil para los equipos de TI priorizar los eventos y determinar cuáles son críticos, y cuáles se pueden tratar más adelante.

Tener una buena visibilidad no solo le da al personal de TI tener acceso más profundo a datos dentro de la infraestructura, además "contar con herramientas que puedan proporcionar una buena visibilidad de la infraestructura de TI permite una detección e investigación más rápida de los incidentes y mejora el análisis de la causa raíz."


New Call-to-action

Garland tiene una variedad de soluciones que han apoyado a sus clientes a ser más eficientes y aumentar el rendimiento de sus herramientas de seguridad. La diferencia de Garland Technology es reconocida por su flexibilidad y adaptabilidad, además de su enfoque directo en la importancia de la visibilidad de la red.

El panorama de las redes ha cambiado mucho, la ciberseguridad y ciberdefensa actual exigen cero pérdidas de paquetes para poder tomar acciones en el momento que ocurren las brechas de seguridad, una visibilidad de punto a punto ahora mismo significa que está pasando exactamente en su red . Si usted quiere conocer como hemos ayudado a nuestros clientes solo comuníquese con nosotros

 

The Importance of Visibility in the Network

More and more IT security managers are installing additional protection and defense tools to counter the growing number of sophisticated attacks. These tools need access to 100% of the data; every bit, byte and packet® to be more effective in their jobs.

As real-time and accurate data are needed, the big challenge is, where and how to get an authentic and accurate copy of network traffic to feed to monitoring and security devices. This is where the visibility of the network becomes necessary and vital. Network TAPs (Test Access Point) are simple, practical and inexpensive devices, requiring only a simple installation without complex configuration, that can satisfy the demand of today’s network administrators.

When visibility is poor, incidents that could be resolved easily, can quickly become more complex. In effect, resolution times increase and become more resource intensive. In addition, it becomes difficult for IT teams to prioritize events and determine which ones are critical, and which ones can be addressed later.

Having good visibility not only gives IT staff more in-depth access to data within the infrastructure, but having tools that can provide good visibility into the IT infrastructure allows faster detection and investigation of incidents, and improves the analysis of the root cause.

Garland has a variety of solutions that have allowed their customers to be more efficient, and increase the performance of their security tools. Garland Technology is recognized for their flexibility and adaptability, in addition to their direct focus on the importance of network visibility.

The network landscape has changed a lot. Current cybersecurity and cyber-defense require zero packet losses to be able to take action at the moment a breach occurs. If you want to know how Garland has helped their clients achieve 100% network visibility, contact them today.

Want to learn more about network monitoring? Read the latest from Garland: The Ultimate Guide to Network Monitoring

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES